Your SlideShare is downloading. ×
Anatomy of hack
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Anatomy of hack

930

Published on

Published in: Technology, Health & Medicine
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
930
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
44
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Keamanan Jaringan Kuliah 3 Anatomy of Hack Helmy Faisal M
  • 2. Hacker Evolution
  • 3. “ thieves have no honor. if you want to do computer security research, do it wisely on your own system or on someone systems who pays you as a security professional.. “ Pesan Moral
  • 4. Anatomy of Hack • Reconnaissance = pengintaian • Mapping Targets = Pemetaan Target • System / Network Penetration = Penetrasi sistem / jaringan
  • 5. Anatomy of Hack • Denial of Service • Consolidation = konsolidasi / penggabungan • Security = keamanan
  • 6. Reconnaissance • Mekanisme yang digunakan untuk mengumpulkan informasi tentang sistem, server, atau jaringan. • Social engineering, Site Reconnaissance. • Account/Password information, phone number.
  • 7. Reconnaissance #2 • Network: IP Address, DNS, Proxy, Router, Server. • Tools : nslookup, dig, whois, host, domtools, adig, axfr, etc..
  • 8. Mapping Targets • Mendokumentasikan peta sistem target, jaringan, dan layanan pada sistem. • War Dialing  mengumpulkan hasil pengintaian yang potensi untuk diserang (poorly secured).
  • 9. Mapping Targets #2 • ICMP and TCP stack fingerprinting untuk memetakan IP dan layanan pada sistem. • Tools : network discovery tools, traceroute, TCP/UDP scanner, port and vulnerabilities scanner, etherape, etc..
  • 10. System/Network Penetration • Menakisme penyerangan terhadap aplikasi, layanan dan protokol jaringan komputer. • Buffer overflow, account cracking, spoofing, exploit, hijacking, sniffing, etc.. • Tools: nessus, nikto, metasploit, satan, vlad, ettercap, chain and able, etc..
  • 11. Denial of Service (DoS) • Mekanisme serangan yang dilakukan secara paralel terhadap aset, layanan, jaringan penetrasi untuk menghabiskan sumber daya pada sistem komputer. Sehingga sistem komputer tidak dapat menjalankan fungsinya dengan benar. • Traffic Flooding, Request Flooding, SYN flooding, etc..
  • 12. Distribute DoS
  • 13. Distribute DoS
  • 14. Consolidation • Mekanisme untuk menggabungkan keuntungan sistem dan jaringan yang telah diserang. • Menghindari kontrol keamanan. • Menghindari deteksi penyusupan. • Menghapus jejak.
  • 15. Anatomy of Hack Overview
  • 16. Security • Mekanisme pertahanan untuk melindungi diri dari serangan.
  • 17. Referensi • The Hacker’s Hand Book – Susan Young & Dave Aitel.

×